with more time features will be needed in the future
for improving the accuracy of risk identification.
Furthermore, coordinate the model, apply the
proposed methodology to more areas of malicious
behaviour, and study the construction of a standard
REFERENCES
A. Abdallah, M. A. Maarof, and A. Zainal, “Fraud detection
system: Asurvey,” J. Netw. Comput. Appl., vol. 68, pp.
90-113, Apr. 2016.
C. Rinner et al., “Process mining and conformance
checking of long running processes in the context of
melanoma surveillance,” Int. J. Env. Res. Pub. He., vol.
15, no. 12, pp. 2809, 2018.
D. Choi, and K. Lee, “Machine learning based approach to
financial fraud detection process in mobile payment
system,” IT Conv. P. (INPRA), vol. 5, no. 4, pp. 12-24,
2017.
E. A. Minastireanu, and G. Mesnita, “An Analysis of the
Most Used Machine Learning Algorithms for Online
Fraud Detection,” Info.Econ., vol. 23, no. 1, 2019.
E. Asare, L. Wang, and X. Fang, “Conformance Checking:
I. M. Mary, and M. Priyadarshini, “Online Transaction
Fraud Detection System,” in 2021 Int. Conf. Adv. C.
Inno. Tech. Engr. (ICACITE), 2021, pp. 14-16.
J. J. Stoop, “Process mining and fraud detection-A case
study on the theoretical and practical value of using
process mining for the detection of fraudulent behavior
in the procurement process,” M.S. thesis, Netherlands,
ENS: University of Twente, 2012.
L. Zheng et al., “Transaction Fraud Detection Based on
Total Order Relation and Behavior Diversity,” IEEE
Trans. Computat. Social Syst.,vol. 5, no. 3, pp. 796-
806, 2018.
M. Jans et al., “A business process mining application for
internaltransaction fraud mitigation,” Expert Syst.
Appl., vol. 38, no. 10, pp.13351-13359, 2011.
M. D. Leoni, W. M. Van Der Aalst, and B. F. V. Dongen,
“Data-and resource-aware conformance checking of
business processes,” in Int.Conf. Bus. Info. Sys.,
Springer, Berlin, Heidelberg, 2012. pp. 48-59.
M. Abdelrhim, and A. Elsayed, “The Effect of COVID-19
Spread on the e-commerce market: The case of the 5
largest e-commerce companies in the world.”
Available at SSRN 3621166, 2020, doi:10.2139/ssrn.3
621166.
P. Rao et al., “The e-commerce supply chain and
environmental sustainability: An empirical investigati
on on the online retail sector. “Cogent. Bus. Manag.,
vol. 8, no. 1, pp. 1938377, 2021.
R. Sarno et al., “Hybrid Association Rule Learning and
Process Mining for Fraud Detection,” IAENG Int. J. C.
Sci., vol. 42, no. 2,2015.
R. A. Kuscu, Y. Cicekcisoy, and U. Bozoklu, Electronic
PaymentSystems in Electronic Commerce. Turkey: IGI
Global, 2020, pp. 114–139.
S. D. Dhobe, K. K. Tighare, and S. S. Dake, “A review on
prevention of fraud in electronic payment gateway
using secret code,” Int. J. Res.Eng. Sci. Manag., vol. 3,
no. 1, pp. 602-606, Jun. 2020.
W. Chomyat and W. Premchaiswadi, “Process mining on
medicaltreatment history using conformance checking,
” in 2016 14th Int. Conf.ICT K. Eng. (ICT&KE), 2016,
pp. 77-83.
Workflow of Hospitals and Workflow of Open-Source
EMRs,” IEEE Access, vol.8, pp. 139546-139566, 2020.
X. Niu, L. Wang, and X. Yang, “A comparison study of
credit card fraud detection: Supervised versus
unsupervised,” arXiv preprintarXiv: vol. 1904, no.
10604, 2019, doi: 10.48550/arXiv.1904.10604.
Z. Li, G. Liu, and C. Jiang, “Deep Representation Learning
withFull Center Loss for Credit Card Fraud Detection,”
IEEE Trans. Computat. Social Syst., vol. 7, no. 2, pp.
569-579, 2020.